4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

BloodyAD: Open-source Active Directory privilege escalation framework

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege escalation techniques within Active Directory environments. Features “I … Continue reading BloodyAD: Open-source Active Directory privilege escalation framework

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect suspicious activities across your network. Am I Isolated: Open-so… Continue reading Don’t let these open-source cybersecurity tools slip under your radar

GUI frontends for GnuPG, the free implementation of the OpenPGP standard

GnuPG is a free and comprehensive implementation of the OpenPGP standard. It enables encryption and signing of data and communications, featuring a key management system and support for public key directories. While primarily a command-line tool, GnuPG… Continue reading GUI frontends for GnuPG, the free implementation of the OpenPGP standard

Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning

The Web Cache Vulnerability Scanner (WCVS) is an open-source command-line tool for detecting web cache poisoning and deception. The scanner, developed by Maximilian Hildebrand, offers extensive support for various web cache poisoning and deception tech… Continue reading Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning